This course covers a wide variety of IT security concepts, tools, and best practices. It introduces threats and attacks and the many ways they can show up. We’ll give you some background of encryption algorithms and how they’re used to safeguard data. Then, we’ll dive into the three As of information security: authentication, authorization, and accounting. We’ll also cover network security solutions, ranging from firewalls to Wifi encryption options. Finally, we’ll go through a case study, where we examine the security model of Chrome OS. The course is rounded out by putting all these elements together into a multi-layered, in-depth security architecture, followed by recommendations on how to integrate a culture of security into your organization or team.
At the end of this course, you’ll understand:
● how various encryption algorithms and techniques work as well as their benefits and limitations.
● various authentication systems and types.
● the difference between authentication and authorization.
● how to evaluate potential risks and recommend ways to reduce risk.
● best practices for securing a network.
● how to help others to grasp security concepts and protect themselves.

TE

Thank you to all the instructors. I learned concrete and useful IT skills from the courses and especially from the projects. After completing this course, I feel I want to learn more and more.

DS

Jan 30, 2019

Filled StarFilled StarFilled StarFilled StarFilled Star

Course 1 and 5 are probably my favorite of the courses because i feel i learned a lot in these two the most, all are great i just really wanted to learn more about security which was course 5

レッスンから

Securing Your Networks

In the fourth week of this course, we'll learn about secure network architecture. It's important to know how to implement security measures on a network environment, so we'll show you some of the best practices to protect an organization's network. We'll learn about some of the risks of wireless networks and how to mitigate them. We'll also cover ways to monitor network traffic and read packet captures. By the end of this module, you'll understand how VPNs, proxies and reverse proxies work; why 802.1X is a super important for network protection; understand why WPA/WPA2 is better than WEP; and know how to use tcpdump to capture and analyze packets on a network. That's a lot of information, but well worth it for an IT Support Specialist to understand!

講師

Google

字幕

I've often been surprised at how creative the Internal Attack Team is at Google and the kinds of mistakes that we made quite innocently in building our own software. But the most interesting kinds of attacks I think are the ones that take advantage of people. We call this social engineering. And we've come to realize that no matter what we do, it will always be possible to social engineer and Google are into doing something for you. We had a great case once where we designed this plasma globe, and we put a Google sticker on it. So, it was like an anniversary gift. And this plasma globe had a USB cable. And the idea was that when you plug it into your computer, it turns on in the globes. But inside there was a little piece of attack code that would take over your computer. And they boxed it up, it looked like a gift. And the Googlers opened it and said, "Oh Google is great. I got a 10 year anniversary gift." And they plugged in the plasma globe into their computer. So, I think we could make the perfect computer, and we could get rid of hackers. But this problem will always exist.